Loading summary
A
You're listening to the Cyberwire Network powered by N2K.
B
AI is changing how enterprises operate and how they stay protected. It's time to eliminate risk and protect innovation. From March 23rd through the 26th, join Trend AI for actionable AI security insights. Catch impactful sessions at RSAC, then unwind and grab a bite at their lounge in Trapa. Sueno Experience industry leading AI security in person. Engage with the experts and get your chance to win $500,000. San Francisco lets AI fearlessly. Learn more@trendmicro.com RS.
C
The word is pretexting, As in subterfuge in order to conceal a true purpose. Definition A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker. Example sentence the scammer posed as a charity worker as a pretext to trick the victim into sending money. Origin and Context Pretexting is used in a wide variety of social engineering attacks, including online spear phishing attacks, in person scams, and physical breaches of company property. According to Crowdstrike, the attacker will present a false scenario or pretext to gain the victim's trust and may pretend to be an experienced investor, HR representative, IT specialist, or other seemingly legitimate source. This attack is not limited to online it can take place through other forms of communication, including in person. CSO Online describes an attack in which a threat actor stole nearly $40 million from Ubiquity Networks by impersonating the company's executives. The pretexter sent messages to ubiquity employees pretending to be corporate executives and requested millions of dollars be sent to various bank accounts. One of the techniques used was lookalike URLs. The scammers had registered a URL that was only one letter different from Ubiquiti's and sent their emails from that domain. The Verge reports that in 2020, a 17 year old from Florida used pretexting to hijack 130 high profile Twitter accounts by posing as an IT department worker and tricking a Twitter employee into granting him access to internal company tools. The perpetrator used this access to compromise official Twitter accounts belonging to Bill G, Elon Musk, Kanye West, Kim Kardashian, Joe Biden, Barack Obama, Cash, Apple, and many more. Nerd reference in the 2003 movie the Italian Job, starring Edward Norton, Charlize Theron, Mark Wahlberg and Jason Statham, among many others, Norton betrays Wahlberg and his professional conman team after they together stole $35 million worth of gold bullion from an Italian gangster safe in Venice and leaves them for dead in Italy. Wahlberg plans a revenge heist against Norton to steal back the gold, but he needs to recon Norton's house to find the safe. Wahlberg's team disconnects the house cable TV wires from the grid and then sends in their newest member of the team. Theron, dressed as the cable TV repair person, complete the with a video camera behind her name tag. She walks around the house with Norton looking for the TV problem and then finds the safe in a back closet. And that is in person Pretexting. Wordnotes is written by Tim Nodar, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening. Foreign.
B
If you only attend one cybersecurity conference this year, make it RSAC 2026. It's happening March 23rd through the 26th in San Francisco, bringing together the global security community for four days of expert insights, hands on learning and real innovation. I'll say this plainly, I never miss this conference. The ideas and conversations stay with me all year. Join thousands of practitioners and leaders tackling today's toughest challenges and shaping what comes next. Register today@rsaconference.com cyberwire26 I'll see you in San Francisco. If you're defending a network today, there's a simple question worth asking. What does the attackers see when they look at your organization? Nord Stellar helps answer that. Nord Stellar is a threat exposure management platform that gives security teams visibility into external risks, including leaked credentials, active session tokens, impersonation attempts, and exposed assets across the Surface Web and the Dark Web. It's built to help organizations detect the consequences of breaches early before attackers turn access into action. From monitoring for infosteer malware logs to identifying cybersquatting and brand abuse, Nord Stellar helps teams focus on the threats that actually matter. Executives get clear, actionable insights tied to business risk, security teams get real time alerts and one of the largest deep and dark web intelligence pools in the industry. Cybercriminals may already be looking for your weak spots. Don't make it easy for them to be the one that's prepared. Defend your business with Nordstellar. Use the code CYBERWIRE10 to unlock your exclusive discount. Go to nordstellar.com cyberwire daily and learn more.
Podcast: Hacking Humans
Network: N2K Networks
Episode: Pretexting (noun) [Word Notes]
Date: March 10, 2026
Theme: Understanding the concept of pretexting as a social engineering technique in cyber crime.
This episode of Hacking Humans [Word Notes] explores “pretexting” — a core method in the toolbox of social engineers and cyber criminals. The hosts thoroughly define the concept, provide real-world examples of high-profile attacks, and even highlight its portrayals in pop culture. The goal is to help listeners recognize and guard against this common but often-overlooked form of deception.
What is Pretexting?
“A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.”
— C [01:02]
Simplified Example:
“The scammer posed as a charity worker as a pretext to trick the victim into sending money.”
— C [01:17]
Online & Offline Attacks:
Ubiquiti Networks Incident:
2020 Twitter Hack:
On Pretexting’s Versatility:
“This attack is not limited to online — it can take place through other forms of communication, including in-person.”
— C [01:38]
Phishing Techniques Involved:
“One of the techniques used was lookalike URLs.”
— C [02:14]
Pop Culture Crossover:
“And that is in-person Pretexting.”
— C [03:54]
The episode gives listeners practical insight into the dangers and mechanics of pretexting. Through real-world examples and a memorable movie scene, it highlights how attackers craft believable false identities to manipulate individuals and organizations. The discussion underscores the need for vigilance, verification, and education to defend against such sophisticated social engineering schemes.